A Criminological Outlook of Cyber Crimes in Sexual Violence Against Children in Indonesian Laws
DOI:
https://doi.org/10.6000/1929-4409.2021.10.26Keywords:
Criminology, sexual violence, child protection, cyber crimes, Indonesia.Abstract
The purpose of this study is to analyze the cybercrimes in sexual violence against children in Indonesian laws. Act Number 11 of 2008 concerning Information and Electronic Transactions, concerning cybercrime specifically regulated in Indonesia. Of the various types of cybercrime that occur in Indonesia, it is interesting to study the vacuum norms governing cyber pornography carried out on children in Act Number 11 of 2008 concerning Information and Electronic Transactions. The crime can be said as violence against children whose punishment can be aggravated as stipulated in the Child Protection Act. This research is a normative legal study by examining the absence of norms in the ITE Law regarding sanctions imposed on perpetrators of child abuse in cyberspace. The study was conducted by using normative research methods so that utilizing primary legal materials such as the Criminal Code, Child Protection Act, Pornography Law, and Electronic Information and Transaction Law. Based on the collection and analysis of the legal material, the results showed that there is a need for criminal penalties for cyber pornography against children. This is done by considering the impact of the crime on the development of children and aims that the perpetrators deter and prevent similar crimes. The results practically contribute that the government is expected to play an active role in continuing to provide protection and assistance for psychological recovery from victims.
References
Arief, B. N. (2006). Tindak pidana mayantara: perkembangan kajian cyber crime di Indonesia. RajaGrafindo Persada.
Arief, B. N. (2007). Masalah penegakan hukum dan kebijakan hukum pidana dalam penanggulangan kejahatan. Kencana Prenada Media Group.
Clark, R. S. (2004). The United Nations Convention Against Transnational Organized Crime. Wayne L. Rev., 50, 161.
Elliott, L. (2007). Transnational environmental crime in the Asia Pacific: an ‘un (der) securitized’security problem?. The Pacific Review, 20(4), 499-522. https://doi.org/10.1080/09512740701671995 DOI: https://doi.org/10.1080/09512740701671995
Emmers, R. (2002). The securitization of transnational crime in ASEAN. https://doi.org/10.1080/0951274032000085653 DOI: https://doi.org/10.1080/0951274032000085653
Fuady, M. E. (2005). “Cybercrime”: Fenomena Kejahatan melalui Internet di Indonesia. Mediator: Jurnal Komunikasi, 6(2), 255-264. https://doi.org/10.29313/mediator.v6i2.1194 DOI: https://doi.org/10.29313/mediator.v6i2.1194
Gema, A. J. (2000). Cybercrime: Sebuah Fenomena di Dunia Maya. Accessed on www. theceli. com.
Golubev, V. Cyber-crime and legal problems of Internet usage. Zaporizhia Law Institute, Ministry of Interior of Ukraine, 1.
Hamzah, A. (1996). Hukum acara pidana Indonesia. Sapta Artha Jaya.
Hasan, H. (2013). Penerapan keadilan restoratif dalam sistem peradilan pidana anak di Indonesia. Jurnal Hukum dan Peradilan, 2(2), 247-262. https://doi.org/10.25216/JHP.2.2.2013.247-262 DOI: https://doi.org/10.25216/jhp.2.2.2013.247-262
Hiller, J. S. (2013, June). Legal aspects of a cyber immune system. In 2013 5th International Conference on Cyber Conflict (CYCON 2013) (pp. 1-15). IEEE.
Iman, C. H. (2018). Kebijakan Hukum Pidana Perlindungan Anak dalam Pembaruan Sistem Peradilan Pidana Anak di Indonesia. Jurnal Hukum dan Peradilan, 2(3), 358-378. https://doi.org/10.25216/JHP.2.3.2013.358-378 DOI: https://doi.org/10.25216/jhp.2.3.2013.358-378
Kim, C., Newberger, B., & Shack, B. (2012). Computer crimes. Am. Crim. L. Rev., 49, 443.
Kromer, M. (2018). Leveling the Playing Field: Law Enforcement and the Challenges of Mobile Digital Forensics (Doctoral dissertation, Utica College).
Liang, B., & Lu, H. (2010). Internet development, censorship, and cyber crimes in China. Journal of Contemporary Criminal Justice, 26(1), 103-120. https://doi.org/10.1177/1043986209350437 DOI: https://doi.org/10.1177/1043986209350437
Makarim, E. (2007). Tindak Pidana terkait dengan Komputer dan Internet: Suatu Kajian Pidana Materiil dan Formil. In Seminar Pembuktian dan Penanganan Cyber Crime di Indonesia, FHUI, Jakarta.
Nugroho, A. H., Bakar, A., & Ali, A. (2017). Analysis of technology acceptance model: Case study of Traveloka. Arthatama: Journal of Business Management and Accounting, 1(1), 32-37.
Paasonen, S. (2011). Online pornography: Ubiquitous and effaced. The handbook of internet studies, 14, 424. https://doi.org/10.1002/9781444314861.ch20 DOI: https://doi.org/10.1002/9781444314861.ch20
Safitri, I. (1999). Tindak Pidana di Dunia Cyber, Insider, Legal Journal From Indonesian Capital and Investment Market. Accessed on http://business.fortunecity.com
Santisteban, J., & Mauricio, D. (2017). Systematic literature review of critical success factors of information technology startups. Academy of Entrepreneurship Journal.
Suhariyanto, B. (2012). Tindak Pidana Teknologi Informasi (Cybercrime). Raja Graffindo Persada, Jakarta.
Wahid, A., & Irfan, M. (2002). Kriminologi dan kejahatan Kontemporer. Lembaga Penerbitan Fakultas Hukum Unisma, Malang.
Wahid, A., & Labib, M. (2005). Kejahatan Mayantara (cyber crime). Refika Aditama.
Yunus, Y. (2013). Analisis Konsep Restorative Justice Melalui Sistem Diversi Dalam Sistem Peradilan Pidana Anak Di Indonesia. Jurnal Rechts Vinding: Media Pembinaan Hukum Nasional, 2(2), 231-245. https://doi.org/10.33331/rechtsvinding.v2i2.74 DOI: https://doi.org/10.33331/rechtsvinding.v2i2.74
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Policy for Journals/Articles with Open Access
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are permitted and encouraged to post links to their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
Policy for Journals / Manuscript with Paid Access
Authors who publish with this journal agree to the following terms:
- Publisher retain copyright .
- Authors are permitted and encouraged to post links to their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work .